Search results for "Security"

showing 10 items of 1693 documents

Evangelical Global Engagement and the American State after World War II

2017

The resurgence of American evangelicalism since the 1940s unfolded in conjunction with efforts by policymakers to instrumentalize religion for the assertion of empire. Missions and foreign aid are two key areas where these dynamics intersected. They show that evangelicals were both at home in the “American century” and deeply critical of global power. Rather than being a weakness, however, these tensions enabled the movement to become a crucial arbiter at a time when the country's new role was not yet firmly legitimized at home. In particular, evangelicalism helped reconcile isolationist, antistatist, and antimilitarist sentiments with hegemonic aspirations, the national security state, and…

National securityHegemonyAmerican Centurybusiness.industryGeneral Arts and Humanitiesmedia_common.quotation_subject05 social sciencesWorld War IIAssertionGeneral Social SciencesEmpire06 humanities and the arts050601 international relations0506 political science060104 historyPower (social and political)State (polity)Political sciencePolitical economyDevelopment economics0601 history and archaeologybusinessmedia_commonJournal of American Studies
researchProduct

A more targeted approach to foreign direct investment: the establishment of screening systems on national security grounds

2018

The process of liberalization of international trade and of Foreign Direct Investment (FDI) has constituted a broadly accepted trend during the last few decades and FDI inflows have expanded constantly since the end of the 1980’s. However, signs of a certain crisis of the positive and one-way attitude towards international trade and FDI exist nowadays. The increase in the flux of FDI coming from developing and emerging countries to developed economies, the sudden relevance of foreign sovereign investors, the changing environment for national security or the quest to protect technologies and sectors of the economy considered vital for the host country, its sovereignty and competitiveness are…

National securityLiberalizationbusiness.industryEconomic sectormedia_common.quotation_subjectInternational economicsForeign direct investmentState (polity)SovereigntyPolitical Science and International RelationsRelevance (law)businessEmerging marketsLawmedia_commonRevista de Direito Internacional
researchProduct

La opinión pública ante la vigilancia masiva de datos. El difícil equilibrio entre acceso a la información y seguridad nacional

2015

RESUMEN: La transparencia y el acceso a la información convierten a la sociedad en una participante activa del proceso de rendición de cuentas de los poderes públicos. Pero, esa libertad informativa tiene límites, como lo es el secreto que necesariamente impone, en la mayor parte de las ocasiones, la salvaguarda de la seguridad nacional. El secreto - y por lo tanto, la excepción a la regla general de la publicidad- tiene como misión impedir que se conozcan ciertas actividades de inteligencia, que recaban y tratan información con la finalidad de garantizar el éxito de determinadas acciones de los servicios de inteligencia-defensa o de prevenir riesgos. En este trabajo se aborda la difícil co…

National securitySociology and Political ScienceDerechoFreedom of informationbusiness.industrymedia_common.quotation_subjectWelfare economicsControl (management)SafeguardingTransparency (behavior)Object (philosophy)GeographyState (polity)AccountabilitybusinessLawCartographymedia_common
researchProduct

Militarization and demilitariation in contemporary Japan and Cultural norms and national security: police and military in postwar Japan

1997

National securitySociology and Political Sciencebusiness.industryLawPolitical sciencePolitical economyPolitical Science and International RelationsbusinessMilitarizationInternational Affairs
researchProduct

Outward Foreign Direct Investment by Chinese National Oil Companies

2015

Developed countries have become increasingly suspicious about the rapid growth of Chinese investments in their home countries and abroad, commonly citing potential threats to national security and global governance as the main sources of anxieties. As a result, policy measures in some developed markets have been put in place to create additional regulation and oversight, specifically in highly regulated and strategic industries, such as the oil sector. This article refutes a number of popular myths about Chinese investments in the global oil industry, and suggests a more rigorous dialogue with the Chinese authorities relating to their integration into international institutions.

National securitybusiness.industryState ownedGeography Planning and DevelopmentEnergy securityForeign direct investmentInternational tradeDevelopmentGlobal governanceMarket economyPetroleum industryEconomicsBusiness and International ManagementbusinessDeveloped countryJournal of East-West Business
researchProduct

Somalia: From the Errors of Colonialism to the Horrors of War

2012

Chapter 5 analyses the reality of the Republic of Somalia, a country which is currently facing the worst humanitarian crisis in history. The first descriptive part of the article shows how the current human catastrophe devastating the Somali people is the result of the incomprehensible de-composition of one of the most homogenous peoples in Africa, not only ethnically speaking, but also from a linguistic, religious and cultural point of view. This de-composition, which has led to Somalia being known as the “State without State”, is undoubtedly rooted in the errors and horrors suffered, in the first place, during the successive processes of colonization and de-colonisation, but also during t…

National securitybusiness.industrymedia_common.quotation_subjectHumanitarian crisisInternational lawHumanitarian interventionSomalilanguage.human_languageIndependenceGeographyPolitical economyDevelopment economicslanguagebusinessResponsibility to protectHuman securitymedia_common
researchProduct

Information in the aspect of security threats and challenges

2019

INFORMATION IN THE ASPECT OF SECURITY THREATS AND CHALLENGESIn the article, the author describes the driving force behind deliberate informational activities. He pays particular attention to the current security situation in the information dimension. Existing systems in the area of security management should be resistant to disinformation and informational operations. There is no room for the freedom of interpretation of the information acquired since every decision results in the actions of people, therefore it requires accuracy and caution. This issue takes on a special dimension when it concerns the state, because this environment contains specific features such as a changing environmen…

National securitybusiness.industrymedia_common.quotation_subjectInterpretation (philosophy)Information processingComputer securitycomputer.software_genreinformation processingsecurity systeminformationResilience (organizational)ScarcitydisinformationDisinformationSecurity managementBusinessDimension (data warehouse)national securitycomputermedia_commonStudia nad Autorytaryzmem i Totalitaryzmem
researchProduct

Young People and the Dark Side of Social Media: Possible Threats to National Security

2020

Social media is increasingly becoming a forum for criminality, misuse, and hate speech, as there are no filters or other controlling mechanisms to filter user-generated content.Furthermore, disinformation and propaganda are becoming more sophisticated and harder to track. Hence, this dark side of social media can pose a viable threat to national security. Future generations will be born into an environment of polluted and polarised online information networks. Consequently, young people, many of whom use social media on a daily basis, will have to find ways to survive in these circumstances,often without the help, knowledge, or experience of earlier generations. Thus, young people are at ri…

National securitypolicebusiness.industrysocial mediaInternet privacysosiaalinen mediapoliisi (organisaatiot)young peoplerikollisuusnuoretGreat RiftPolitical scienceinformaatiovaikuttaminenSocial medianational securitykansallinen turvallisuustietoturvabusinessinformation influenceriskitProceedings of the 19th European Conference on Cyber Warfare
researchProduct

Multiple Actors in Framing the EU's External Policy: The Case of the EU Global Security Strategy

2017

The functioning of the European External Action Service (EEAS) has been a much discussed issue since its establishment. By constructing, through the Treaty of Lisbon, a single actor for the EU external policy, the EEAS now has to deal with finding most efficient ways of accommodating the interests of both the EU Member States and the EU institutions. The paper applies the Principal-Agent method to examine the delegation of EU external policy to the EEAS. The vague mentioning of the EEAS in the Lisbon Treaty and the inter-institutional negotiations preceding the July 2010 Council Decision on the organisation and functioning of the EEAS illustrate how Member States have decided to leave a rem…

NegotiationFraming (social sciences)media_common.quotation_subjectCorporate governancePolitical scienceInternational securityGlobal strategyPublic administrationTreatyTreaty of LisbonDiscretionmedia_commonSSRN Electronic Journal
researchProduct

Data for: Detection of Algorithmically Generated Malicious Domain Names using Masked N-Grams

2019

It contains the dataset used for the experimentation. Specifically, there are two text files, each containing 32000 different domain names. One file is clean domain names, the other file contains DGA domains. THIS DATASET IS ARCHIVED AT DANS/EASY, BUT NOT ACCESSIBLE HERE. TO VIEW A LIST OF FILES AND ACCESS THE FILES IN THIS DATASET CLICK ON THE DOI-LINK ABOVE

Network SecurityData_FILESInterdisciplinary sciencesOtherMalware Mitigation
researchProduct